YARAify Scan Results

You are viewing the YARAify database entry for the file with the SHA256 hash bc27696d09253bb8c75d82178351657b1ca5e49a324e73fe2bc6a49fd93cd617.

Scan Results


SHA256 hash: bc27696d09253bb8c75d82178351657b1ca5e49a324e73fe2bc6a49fd93cd617
File size:3'721'280 bytes
File download: Original
MIME type:application/x-dosexec
MD5 hash: 3e1370070bc08fadb1ecd743ef068d69
SHA1 hash: c92d5cb8b2e07924faf147e0d53afd36eec22d75
SHA3-384 hash: 35c6ea148ba73792478de0c1dff9e7737e5ab45161b4282b2a70e8f8a419a0927aadd5f24839f1571e5801e1dcd9d814
First seen:2026-03-14 15:30:04 UTC
Last seen:Never
Sightings:1
imphash : afcdf79be1557326c854b6e20cb900a7
ssdeep : 49152:uh+ZkldoPK8YaKjKVmgbQIzZMPXpB91rHpn/qKmNAOaG6IOY/B+qtCF:n2cPK82nLrHp/qKm2/Sb/gqAF
TLSH :n/a
telfhash :n/a
gimphash :n/a
dhash icon : aae2f3e38383b629

Tasks


There are 1 tasks on YARAify for this particular file. The 10 most recent ones are shown below.

Task Information


Task ID:ac711cdc-1fba-11f1-b47f-42010aa4000b
File name:3e1370070bc08fadb1ecd743ef068d69
Task parameters:ClamAV scan:True
Unpack:False
Share file:True

ClamAV Results


The file matched the following open source and commercial ClamAV rules.

Signature:SecuriteInfo.com.JS.EmbeddedEXE-5.UNOFFICIAL
Signature:SecuriteInfo.com.Macro.Obfus-3.UNOFFICIAL
Signature:Win.Trojan.Autoit-10025536-0
Signature:Win.Trojan.Autoit-10028150-0

YARA Results


Static Analysis

The following YARA rules matched on the file (static analysis).

Rule name:classified
Author:classified
Description:classified
TLP :TLP:AMBER
Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious.
TLP:TLP:WHITE
Repository:bartblaze
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
TLP:TLP:WHITE
Repository:YARAify
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
TLP:TLP:WHITE
Rule name:Detect_all_IPv6_variants
Author:Bierchermuesli
Description:Generic IPv6 catcher
TLP:TLP:WHITE
Repository:YARAify
Rule name:classified
Author:classified
Description:classified
TLP :TLP:GREEN
Rule name:classified
Author:classified
Description:classified
TLP :TLP:GREEN
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
TLP:TLP:WHITE
Repository:YARAify
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
TLP:TLP:WHITE
Repository:YARAify
Rule name:html_auto_download_b64
Author:Tdawg
Description:html auto download
TLP:TLP:WHITE
Repository:MalwareBazaar
Rule name:SUSP_Imphash_Mar23_3
Author:Arnim Rupp (https://github.com/ruppde)
Description:Detects imphash often found in malware samples (Maximum 0,25% hits with search for 'imphash:x p:0' on Virustotal) = 99,75% hits
Reference:Internal Research
TLP:TLP:WHITE
Repository:Neo23x0
Rule name:TH_Generic_MassHunt_Win_Malware_2025_CYFARE
Author:CYFARE
Description:Generic Windows malware mass-hunt rule - 2025
Reference:https://cyfare.net/
TLP:TLP:WHITE
Repository:YARAify
Rule name:classified
Author:classified
Description:classified
TLP :TLP:AMBER
Rule name:classified
Author:classified
Description:classified
TLP :TLP:AMBER
Rule name:WIN_WebSocket_Base64_C2_20250726
Author:dogsafetyforeverone
Description:Detects configuration strings used by malware to specify WebSocket command-and-control endpoints inside Base64-encoded data. It looks for prefixes such as '#ws://' or '#wss://' that were found in QuasarRAT configuration data.
TLP:TLP:WHITE
Repository:YARAify

Unpacker

The following YARA rules matched on the unpacked file.

Unpacked Files


The following files could be unpacked from this sample.